Escolar Documentos
Profissional Documentos
Cultura Documentos
Abstract
Wireless Sensor Network provides a solution for various applications like nuclear power plant, military. This type of application
required continuous monitoring. WSN is unprotected by various attacks; wormhole attack is one of among them. In this attack an
attacker able to receive a packet from one location and drop it into another location. We propose an algorithm to defend
wormhole attack, which is based on public key encryption and acknowledgement based. Proposed algorithm provides secure
communication and detects misbehaving nodes.
Sensor Node
_______________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org
102
Authentic Node
Attacker node
Security Goals
Wormhole Tunnel
Primary Goals
Secondary Goals
2.
SENSOR
NODE
ARCHITECTURE
AND
Confidentiality
Data Freshness
Integrity
Self-Organization
SECURITY REQUIREMENTS
2.1 Sensor Node Architecture
Authentication
Availability
Sensor
Power
Microcontroller
Transceiver
Data Exchange
Secure Localization
Memory
Supply
Time
Synchronization
1) Authentication:
Authentication gives the consistently best performance of a
message identifying its original source [2]. WSN have large
amount of nodes in the network. The sensor node collects
sensitive data which help to take many decisions.
Authentication ensures that the received message is coming
from origin [4]. An attacker not only going to modify the
packet but also can change the whole packet stream by
adding additional packet. Due to this, the receiver should
have a decision making process to take decision for received
packet is came from authenticate node. During the
deployment of networks, authentication is required for many
administrative tasks; it allows a receiver to verify that
received data is coming from claiming sender. It can be
achieved through symmetric or asymmetric mechanisms. To
provide a secure communication in hostile environments, it
is challenging task to ensure authentication [2, 4].
2) Integrity:
WSN consist of a large number of nodes which
communicates with the help of certain communication
range. In this type of network adversaries may be present,
_______________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org
103
3. RELATED WORK
Ali modirkhazeni, Sadeedeh Aghamahmoodi, Arsalan
Modirkhazeni and Nagrneh Niknejad [1] proposed approach
to motigate the wormhole attack in WSN. It find the
wormhole in network based on HELLO message and
RESPONSE message. It uses shared secret key for
communication purposes. Dhara butch and Devesh
Jinwala[7] proposed a method to detect wormhole in the
network. It is based on statistical analysis of sent and
received packets. It requires strong synchronization. Gunhee
Lee, Dong-Kyoo Kim, and Jungtaek Seo [13] proposed
method for mitigation of wormhole in wireless Ad-hoc
network. It uses two hope correctness test based on this they
mitigate the wormhole in network. Amar Rashid and Rabi
Mahapatra [16] proposed a technique to mitigate wormhole
in the wireless network. They detect wormhole based on
unknown pairwise key or unknown data transmission
channel in the network. Jakob Erikson, Shrikanth
V.Krisnamurty and Michalis Falutos proposed a TrueLink
protocol or defending wormhole in a wireless network.
TABLE- I
COUNTERMEASURES FOR WORMHOLE ATTACK
Sr.
No.
1
Author
Proposed
Scheme
Distributed
approach to
mitigate
wormhole attack
in Wireless
Sensor Network
Key Used
Mitigate
the
wormhole attack
in wireless Adhoc network
Session Key
Mobile Sink
Using Multiple
Channels to
Defend Against
Wormhole
Attacks in
Wireless Sensor
Networks
Use
polynomial
key
management
scheme
Proposed
Truelink
Protocol
None
Ali
modirkhazeni,Saeedeh
Aghamahmoodi,Arsalan
Modirkhazeniand
Naghmeh Niknejad[1]
Shared
secrete key
_______________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org
104
Transmission
Time based
mechanism
Detection of
wormhole attack
in wireless
network based
on statistics of
sent and
received packet
None
None
4. PROPOSED SYSTEM
Wireless Sensor Network consists of a number of sensor
node devices which are placed in unnoticed area. WSN is
unprotected from various attacks. Wormhole attack is one of
attack in WSN. In this attack, an attacker forms tunnel
which drop the packets to another location. Here we
proposed a mechanism which is used to defend a wormhole
attack in the network. It uses public key cryptography and
2Ack scheme. We can find the misbehaving nodes in the
network.
(1)
4.2 System
Each node in the network has a public key and a private key
and every node shared its public key at the time of neighbor
discovery. The proposed system is starting with every node,
every node sends HELLO message to all nodes. This
forwarded message has source address and its own public
key, which is broadcasted to all the nodes. To reply this
message, every authentic node sent their public key to that
node. Suppose when a node P want to send data to Q then P
encrypt the data with public key of Q and then again
encrypted with the help of the private key of sender that is P.
When Q receives the data then it can be decrypted with the
help of the public key of the sender that of P and its private
key of Q. For the encryption and the decryption purposes
we use the ECC algorithm. To check the successful
transmission we use 2Ack scheme that are we taking the
acknowledgement from two successive nodes in the
network. By using this technique we can easily find the
misbehaving or malicious node in the network. For the
consideration of two next authenticate node we find the path
to the base station. If the attacker able to receive messages
but he could not able to decrypt messages. With this
approach we consider that an attacker cannot be going to do
the acknowledgement spoofing attack. If R is successive
node then Q forward message to R. Node P is waiting for
acknowledgement from Q and R. If P received
acknowledgement from Q and R then data transmission is
done successfully is assumed by P. If P hasn't received
acknowledgement from Q and R then its considered that Q
is a misbehaving node. If acknowledgement is not coming
from R then it assumes that R is misbehaving node in the
network. Misbehaving node is nothing but node which has
only accepted the data but could not forward to next node.
Hence sensed data by other nodes cannot receive to base
station and loss of data is done. The 2Ack can be used when
the data is lost. The proposed approach provides secure
communication and finds misbehaving nodes.
ED Encryption of data
In case of 2ACK,
Let probability of successful transmission as P(S),
so probability of successful reception of 2Ack is
_______________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org
105
Value
Simulation time
200 Sec
Simulation area
Number of Nodes
20
Communication
Range
Default 50 meter
Fig.8: Throughput
CONCLUSIONS
To provide a security in WSN is a challenging task. Here
we implement the system to mitigate the wormhole attack in
WSN called public key encryption and 2ACK based
approach. Our proposed approach provides secure
communication. The ratio of proposed approach for received
packet is more than the existing system. Using our approach
we mitigate wormhole attack in WSN. If this approach is
used for WSN then secure communication will be possible.
REFERENCES
Fig.5 :False packet detected
_______________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org
106
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
_______________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org
107